The Internet standards process Ian Brown. Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches.

Slides:



Advertisements
Similar presentations
Copyright, Issues from Internet Technologies 3 – Internet Governance Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow, Unis of.
Advertisements

Whos who in the IETF Zoo? Geoff Huston Executive Director, Internet Architecture Board.
doi> Digital Object Identifier: overview
STF 287 Multicultural Communication 1 Matching language and cultural requirements Specialist Task Force STF 287 User-oriented handling of multicultural.
SEM21-02 ETSI Seminar 2010 « Legal Considerations » Erik Jansen, LL.M. ETSI Legal Director Copyright © ETSI All rights reserved. ETSI Seminar Sophia.
GSC: Standardization Advancing Global Communications Towards a Common ITU/ISO/IEC Patent Policy by Masamichi Niiya Telecommunication Standardization Bureau.
Rue du Rhône 114- CH-1204 Geneva - T: F: Ecma TC43: Universal 3D.
International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
Fostering worldwide interoperabilityGeneva, July 2009 Lawful Interception and Data Retention Presenter: Mike Sharpe, VP ETSI ESP Source: Peter van.
Support and Transparent Process for ENUM Designated Zone implementations for the USA Before the Dept of State ITAC-T Advisory Committee SG-A AdHoc Meeting.
IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
SNMP (Simple Network Management Protocol) Overview Draft Version.
1 TC LI ETSI Technical Committee Lawful Interception ETSI/TC LI Peter van der Arend (Royal KPN) Chairman ETSI/TC LI.
Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
Geneva, Switzerland, September 2014 ETSI TC Cyber Charles Brookson Chairman ETSI TC Cyber Zeata Security Ltd and Azenby Ltd ITU.
Deterministic Networking (DetNet) BoF IETF 91 Monday Afternoon Session II, Coral 1.
1 ETSI and Lawful Interception Robin Gape Chair TC Sec WG LI.
TETRA Inter System Interface (ISI)
Chapter 1 1.  Introduction to Networking  Fundamental Network Characteristics  Type and Sizes of Networks  Network Performance issues and Concepts.
International Telecommunication Union ITU Perspective on ENUM Robert Shaw ITU Internet Strategy and Policy Advisor ICANN Rio de Janeiro, Brazil March 25,
“ICANN and the Global Internet” ICANN Workshop Wednesday, October 9, 2002 Mexico City.
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao
Presentation By: Lindsay McCollum Jenna Larsen Joe Soukup.
ENUM Chris Wong Converging Services Branch International Training Program 7 September 2006.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Networking Standards. Objectives Identify organizations that set standards for networking.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
Management of the Internet
Architecture of Grid File System (GFS) - Based on the outline draft - Arun swaran Jagatheesan San Diego Supercomputer Center Global Grid Forum 11 Honolulu,
Security and LI; ETSI’s role in standards
The need for further standards and technical developments Brian Moore ITU-T Study Group 13 Chairman Lucent Technologies.
Chapter 1 1.  Introduction to Networking  Fundamental Network Characteristics  Type and Sizes of Networks  Network Performance issues and Concepts.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
International Telecommunication Union Geneva, 2 November 2009 Total Conversation – Meeting UN Convention and European Commission requirements for everyday.
Network Standards By Rashid Amin. “A standard provides a model for development that makes it possible for a product to work regardless of the individual.
Chapter 1 Communication Networks and Services Network Architecture and Services.
Designing the Architecture for Grid File System (GFS) Arun swaran Jagatheesan San Diego Supercomputer Center Global Grid Forum 12 Brussels, Belgium.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
TCP/IP Protocol Suite 1 Chapter 1 Objectives Upon completion you will be able to: Introduction Understand the history of the Internet Understand the meaning.
TIA IPR Standing Committee Report to TIA Technical Committee “Normative References and IPR” October 21, 2005 Paul Vishny, Chair Dan Bart, TIA.
IMS developments in 3GPP
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
1 February 8th, 2002 ITU ENUM Tutorial Stanislas Bourgain Autorité de régulation des télécommunications Unité Internet Service Interconnexion et Nouvelles.
IEEE 802Emergency Services Exec. Committee Study Group Report to IETF ECRIT Geoff Thompson/GraCaSI (supported by Interdigital) Study Group/WG Chair IETF.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
International Telecommunication Union ITU Perspective on ENUM Robert Shaw ITU Internet Strategy and Policy Advisor ICANN Rio de Janeiro, Brazil March 25,
Update on ITU-T ENUM Activities Steven D. Lind AT&T SG-A ENUM - Ad Hoc February 12, 2001.
Summary of GSC-13 IPR WG Meeting Tom Goode, ATIS IPR WG Chair DOCUMENT #:GSC13-CL-05r1 FOR:Presentation SOURCE:Tom Goode, IPR WG Chair AGENDA ITEM:3.4.
Federal Department of Environment, Transport Energy and Communications UVEK Federal Office of Communications OFCOM Telecom/FG, Fix Network and Universal.
Domain Day ICANN and Reform Tuesday, 5 November 2002 Milan, Italy Theresa Swinehart, Counsel for International Legal Affairs, ICANN.
ENF/ERO ENUM Convergence Workshop Tony Holmes Chairman ETSI SPAN11 NAR BTexact Technologies Numbering Addressing & Routeing 9-10 January 2002 Standards.
SNMP (Simple Network Management Protocol) Overview
Chapter 3: Network Protocols and Communications
Unit 36: Internet Server Management
OGSA Service Classifications
Network Services Interface Working Group
SNMP (Simple Network Management Protocol) Overview
Designing the Architecture for Grid File System (GFS)
The Web Standards Process
IP and NGN Projects in ITU-T Jean-Yves Cochennec France Telecom SG13 Vice Chair Workshop on Satellites in IP and Multimedia - Geneva, 9-11 December 2002.
Network Services Interface Working Group
Towards a Common ITU/ISO/IEC Patent Policy
Chapter 1 Introduction.
WCIT12 Update Planning & International Relations Department
Multimedia Training Kit
ICT Policy سياسات تكنولوجيا المعلومات والاتصالات
Summary of GSC-13 IPR WG Meeting
Presentation transcript:

The Internet standards process Ian Brown

Overview What standards need setting? Protocols – the IETF and the ITU Approaches to wiretapping Approaches to patents Domain names and addresses

Ideal of open standards Many different client and server applications give user choice, competition on features and price, and resistance to catastrophic attacks

Communications protocols Define the format and sequence of messages that pass between two or more communicating processes on one or more processors Can be closed (many proprietary systems), open (standards-based) or open with proprietary extensions

What does a protocol look like? HELO machinename MAIL FROM: I.Brown RCPT TO: I.Brown DATA 250 Looks good to me 250 OK 354 Enter Mail, end by a line with only '.' 250 OK 250 Submitted & queued (0/msg ) Message text

Competition implications Closed protocols can be used to leverage a monopoly in one area (e.g. desktop operating system) into another (e.g. server software) Protocol analysers and reverse engineering can be used to discover details of protocols – arms race

Internet Engineering Task Force First met in San Diego in 1986 with 21 attendees Forthcoming meeting in Minneapolis is 73 rd in series Attendance peaked at 3,000 in 2000 and is still around 2,000, 3 times a year

IETF working groups All IETF protocols developed in ~120 working groups in one of 8 areas Groups make decisions by rough consensus and running code Consensus must be found on mailing lists rather than at physical meetings

Example IETF working groups avt Audio/Video Transportavt behave Behavior Engineering for Hindrance Avoidancebehave dccp Datagram Congestion Control Protocoldccp enum Telephone Number Mappingenum ieprep Internet Emergency Preparednessieprep ippm IP Performance Metricsippm ips IP Storageips iptel IP Telephonyiptel megaco Media Gateway Controlmegaco midcom Middlebox Communicationmidcom

IETF process Protocol documents begin life as Internet drafts (currently over 1,000) Successful drafts become Requests for Comments (RFCs) RFCs can be standards-track (proposed, draft or full), Informational, Experimental or Best Current Practice

ITU-T International Telecommunications Union (Telecoms sector) Part of United Nations system where governments and companies coordinate telecoms networks and services Work done in study groups mostly by corporate staff but needs to be agreed by government representatives

ITU process Much lower volume communication than IETF Work tends to progress more slowly and mainly at Geneva meetings

Example ITU study groups Study Group 13 Multi-protocol and IP-based networks and their internetworking Lead Study Group for IP related matters, B-ISDN, Global Information Infrastructure and satellite matters. Study Group 16 Multimedia services, systems and terminals Lead Study Group on multimedia services, systems and terminals, e-business and e-commerce. Study Group 17 Data Networks and Telecommunication Software Lead Study Group on frame relay, communication system security, languages and description techniques.

Other relevant bodies W3C – World Wide Web Consortium ETSI – European Telecommunications Standards Institute IEEE – Institute for Electrical and Electronics Engineering ISO – International Standards Organisation

Approaches to lawful access Wiretapping requirements imposed by legislation (e.g. Communications Assistance to Law Enforcement Act of 1994 in US, Regulation of Investigatory Powers Act 2000 in UK) Requirements placed on manufacturers in US, ISPs and phone companies in both countries

Lawful access requirements Undetectable to subject Invisible to unauthorised personnel and other interceptors Any available decryption keys should be provided Only authorised information should be provided

IETF approach FBI requested wiretapping capability in Megaco protocol IETF created mailing list to debate; 500 participants Plenary debate at Washington DC meeting; very few in favour, many against, majority silent

IETF decision The IETF has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards 1. Inappropriate in global standards – different legal and privacy requirements 2. Would increase protocol complexity and decrease security 3. End-to-end security makes unworkable 4. Otherwise, many facilities already available

Ongoing IETF debate the IETF believes that mechanisms designed to facilitate or enable wiretapping, or methods of using other facilities for such purposes, should be openly described, so as to ensure the maximum review of the mechanisms and ensure that they adhere as closely as possible to their design constraints. Cisco Architecture for Lawful Intercept in IP Networks (RFC 3924)

ETSI approach The Technical Committee on Lawful Interception (TC LI) is the leading body for lawful interception standardization within ETSI. Lawful interception standards have also been developed by ETSI technical bodies AT, TISPAN (/SPAN and TIPHON), TETRA, and by 3GPPATTISPANTETRA3GPP

ETSI standards ES Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic (revised version). ES Telecommunications Security; Lawful Interception (LI); Requirements for Network Functions TS Telecommunications Security; Lawful Interception (LI); Service-specific details for internet access services; TS Telecommunications Security; Lawful interception (LI); Service-specific details for services TS Telecommunications Security; Lawful Interception (LI); Handover Specification for IP Delivery TS Telecommunications Security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic. TS Telecommunications Security; Lawful Interception (LI); Requirements of Law Enforcement Agencies TR Telecommunications Security; Lawful Interception (LI); Notes on ISDN lawful interception functionality. TR Telecommunications Security; Lawful Interception (LI); Issues on IP Interception. TR Telecommunications Security; Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture.

Patent issues Open standards of limited use if they require patent-protected technology Very popular with patent owners! Standards bodies now addressing issue to a greater or lesser extent

IETF IPR policy This page provides a mechanism for filing Disclosures about intellectual property rights (IPR) and for finding out what IPR Disclosures have been filed. The IETF takes no position regarding the validity or scope of any intellectual property rights or other rights that might be claimed to pertain to the implementation or use of the technology described in any IETF documents or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at

W3C IPR policy Whenever possible, technical decisions should be made unencumbered by intellectual property right (IPR) claims. To this end, W3C discloses to the entire Membership which organizations have made IPR claims about a particular technology, as well as the details of those claims where they have been provided. Individuals should immediately disclose any IPR claims they know may be essential to implementing a Recommendation track technical report. Goes further than IETF RAND target

Domain names Domain Name System maps IP addresses ( ) to Fully-Qualified Domain Names (happy.cs.ucl.ac.uk) Overseen by ICANN, managed by registrars and registrants International controversy (US control of process and root servers) Trouble with trademarks